Angles最新文献

筛选
英文 中文
Development of a method for targeted monitoring and processing of information security incidents of economic entities 制定有针对性地监测和处理经济实体信息安全事件的方法
Angles Pub Date : 2022-10-10 DOI: 10.1007/s11416-022-00449-8
A. Kirov, V.V. Sizov
{"title":"Development of a method for targeted monitoring and processing of information security incidents of economic entities","authors":"A. Kirov, V.V. Sizov","doi":"10.1007/s11416-022-00449-8","DOIUrl":"https://doi.org/10.1007/s11416-022-00449-8","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"381 - 386"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43720405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling advanced persistent threats using risk matrix methods 使用风险矩阵方法建模高级持续性威胁
Angles Pub Date : 2022-10-08 DOI: 10.1007/s11416-022-00440-3
N. D. Ivanova, V. G. Ivanenko
{"title":"Modeling advanced persistent threats using risk matrix methods","authors":"N. D. Ivanova, V. G. Ivanenko","doi":"10.1007/s11416-022-00440-3","DOIUrl":"https://doi.org/10.1007/s11416-022-00440-3","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"367 - 372"},"PeriodicalIF":0.0,"publicationDate":"2022-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41563887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Counteraction the cybersecurity threats of the in-vehicle local network 应对车载局域网的网络安全威胁
Angles Pub Date : 2022-09-15 DOI: 10.1007/s11416-022-00451-0
E. Y. Pavlenko, K. V. Vasileva, D. Lavrova, D. Zegzhda
{"title":"Counteraction the cybersecurity threats of the in-vehicle local network","authors":"E. Y. Pavlenko, K. V. Vasileva, D. Lavrova, D. Zegzhda","doi":"10.1007/s11416-022-00451-0","DOIUrl":"https://doi.org/10.1007/s11416-022-00451-0","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"399 - 408"},"PeriodicalIF":0.0,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45612528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On improvements of robustness of obfuscated JavaScript code detection 关于模糊JavaScript代码检测鲁棒性的改进
Angles Pub Date : 2022-09-09 DOI: 10.1007/s11416-022-00450-1
G. S. Ponomarenko, P. Klyucharev
{"title":"On improvements of robustness of obfuscated JavaScript code detection","authors":"G. S. Ponomarenko, P. Klyucharev","doi":"10.1007/s11416-022-00450-1","DOIUrl":"https://doi.org/10.1007/s11416-022-00450-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"387 - 398"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45803595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks 时间依赖性:用于无线医疗传感器网络安全通信的高效生物识别认证
Angles Pub Date : 2022-09-09 DOI: 10.1007/s11416-022-00448-9
Meysam Ghahramani, R. Javidan
{"title":"Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks","authors":"Meysam Ghahramani, R. Javidan","doi":"10.1007/s11416-022-00448-9","DOIUrl":"https://doi.org/10.1007/s11416-022-00448-9","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"303 - 317"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45638673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection 利用第一道防线:研究android安全权限的演变和使用,以增强android恶意软件检测
Angles Pub Date : 2022-08-26 DOI: 10.1007/s11416-022-00432-3
Alejandro Guerra-Manzanares, Hayretdin Bahsi, Marcin Luckner
{"title":"Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection","authors":"Alejandro Guerra-Manzanares, Hayretdin Bahsi, Marcin Luckner","doi":"10.1007/s11416-022-00432-3","DOIUrl":"https://doi.org/10.1007/s11416-022-00432-3","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"65 - 96"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45043275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Undocumented x86 instructions to control the CPU at the microarchitecture level in modern Intel processors 在现代英特尔处理器的微体系结构级别上控制CPU的未记录的x86指令
Angles Pub Date : 2022-08-25 DOI: 10.1007/s11416-022-00438-x
M. Ermolov, Dmitry Sklyarov, Maxim Goryachy
{"title":"Undocumented x86 instructions to control the CPU at the microarchitecture level in modern Intel processors","authors":"M. Ermolov, Dmitry Sklyarov, Maxim Goryachy","doi":"10.1007/s11416-022-00438-x","DOIUrl":"https://doi.org/10.1007/s11416-022-00438-x","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"351 - 365"},"PeriodicalIF":0.0,"publicationDate":"2022-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44027747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Post-quantum security of messengers: secure group chats and continuous key distribution protocols 信使的后量子安全:安全群聊和连续密钥分发协议
Angles Pub Date : 2022-08-25 DOI: 10.1007/s11416-022-00446-x
J. Bobrysheva, S. Zapechnikov
{"title":"Post-quantum security of messengers: secure group chats and continuous key distribution protocols","authors":"J. Bobrysheva, S. Zapechnikov","doi":"10.1007/s11416-022-00446-x","DOIUrl":"https://doi.org/10.1007/s11416-022-00446-x","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"373 - 380"},"PeriodicalIF":0.0,"publicationDate":"2022-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44313630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach for the automatic verification of blockchain protocols: the Tweetchain case study b区块链协议的自动验证方法:Tweetchain案例研究
Angles Pub Date : 2022-08-25 DOI: 10.1007/s11416-022-00444-z
M. Raimondo, Simona Bernardi, S. Marrone, J. Merseguer
{"title":"An approach for the automatic verification of blockchain protocols: the Tweetchain case study","authors":"M. Raimondo, Simona Bernardi, S. Marrone, J. Merseguer","doi":"10.1007/s11416-022-00444-z","DOIUrl":"https://doi.org/10.1007/s11416-022-00444-z","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"17 - 32"},"PeriodicalIF":0.0,"publicationDate":"2022-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52705332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RETRACTED ARTICLE: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry 人工智能辅助旅游行业网络威胁评估与应用
Angles Pub Date : 2022-08-22 DOI: 10.1007/s11416-022-00436-z
Liqin Zhang
{"title":"RETRACTED ARTICLE: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry","authors":"Liqin Zhang","doi":"10.1007/s11416-022-00436-z","DOIUrl":"https://doi.org/10.1007/s11416-022-00436-z","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"199 - 215"},"PeriodicalIF":0.0,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44273094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信